CVE-2023-4317

An issue has been discovered in GitLab affecting all versions starting from 9.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for a user with the Developer role to update a pipeline schedule from an unprotected branch to a protected branch.
References
Link Resource
https://gitlab.com/gitlab-org/gitlab/-/issues/421846 Broken Link Vendor Advisory
https://hackerone.com/reports/2089517 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:gitlab:gitlab:16.6.0:*:*:*:community:*:*:*
cpe:2.3:a:gitlab:gitlab:16.6.0:*:*:*:enterprise:*:*:*

History

No history.

Information

Published : 2023-12-01 07:15

Updated : 2023-12-06 19:21


NVD link : CVE-2023-4317

Mitre link : CVE-2023-4317

CVE.ORG link : CVE-2023-4317


JSON object : View

Products Affected

gitlab

  • gitlab
CWE
NVD-CWE-noinfo CWE-284

Improper Access Control